Authorities Dismantle DiskStation Ransomware Gang Targeting NAS

Edward Zhou
Edward Zhou

CEO & Founder

 
July 19, 2025 3 min read

Police Disrupt “Diskstation” Ransomware Gang Attacking NAS Devices

ransomware
Image courtesy of TechRadar

A 44-year-old Romanian national has been arrested during a law enforcement operation to dismantle a ransomware campaign known as “Diskstation.” This group primarily targets Synology Network-Attached Storage (NAS) devices, which are essential for centralized file storage and sharing, data backup and recovery, and general content hosting. Since its inception in 2021, Diskstation has operated under various aliases, including DiskStation Security, Quick Security, LegendaryDisk Security, 7even Security, and Umbrella Security.

Police received multiple complaints from companies in Lombardy that suffered data encryption and were unable to operate without paying a ransom for decryption keys. The attacks have targeted organizations across sectors, including film production and civil rights protection, causing significant operational disruptions.

Operation Elicius

Arrest
Image courtesy of BleepingComputer

Operation Elicius, coordinated by Europol, involved extensive forensic analysis of encrypted devices and blockchain tracking to identify ransom payments made in cryptocurrency. Investigations led to multiple raids in Romania, where several suspects were apprehended, including one caught in the act. The primary suspect, now in custody, faces charges of abusive access to computer systems and extortion.

Victims reported ransom demands ranging from $10,000 to hundreds of thousands of dollars. The investigation highlighted vulnerabilities in internet-exposed NAS devices, emphasizing the critical need for enhanced security measures.

Ransomware Attacks on Synology Devices

DiskStation ransom note
Image courtesy of BleepingComputer

Companies affected by Diskstation experienced severe outages due to the encryption of their data, which halted production processes. The victims included graphic design firms, film production companies, and international NGOs. To regain access to their data, victims were forced to pay substantial ransoms in cryptocurrency to the attackers.

Law enforcement agencies utilized digital forensics and blockchain analysis to trace the criminal network, demonstrating the effectiveness of a multi-pronged investigative approach. The use of advanced malware detection techniques helped uncover the methods employed by the cybercriminals.

Protecting NAS Devices from Ransomware

In light of the attacks, it is crucial for organizations using NAS devices to implement stringent security measures. Recommendations include ensuring devices operate on the latest firmware, disabling unnecessary services, and minimizing internet exposure.

Synology has provided guidelines to protect NAS devices from ransomware, advising users to enhance password security and regular data backups. Furthermore, enabling two-step verification and disabling remote services can significantly reduce risks.

Organizations can benefit from Gopher Security’s AI-Powered Zero Trust Platform, which offers comprehensive security solutions to protect devices from ransomware attacks. This includes micro-segmentation for secure environments, granular access control, and secure access service edge (SASE) capabilities.

Authorities Dismantled “Diskstation” Ransomware Attacking Synology NAS Devices Worldwide
Image courtesy of Cybersecurity News

Conclusion

Through international cooperation, law enforcement has successfully disrupted the Diskstation ransomware gang, underscoring the importance of robust cybersecurity measures. Organizations are encouraged to bolster their defenses against ransomware threats by leveraging advanced security solutions.

For organizations looking to enhance their cybersecurity posture and protect against ransomware attacks, Gopher Security offers innovative security solutions tailored to meet the needs of businesses across various sectors. Explore our services or contact us to learn more about how we can help secure your digital assets. Visit us at Gopher Security.

Edward Zhou
Edward Zhou

CEO & Founder

 

CEO & Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions..

Related Articles

Ransomware Attacks Target Russian Vodka and Healthcare Sectors

The Novabev Group, parent company of the Beluga vodka brand, experienced a ransomware attack on July 14, 2025, causing significant disruptions. The attack affected WineLab, the company's liquor store chain, leading to a three-day closure of over 2,000 locations in Russia. The company reported that the attack crippled its IT infrastructure, particularly point-of-sale systems and online services. Novabev Group stated, "The company maintains a principled position of rejecting any interaction with cybercriminals and refuses to fulfill their demands."

By Alan V Gutnov July 19, 2025 3 min read
Read full article

Retail Sector Faces Surge in Ransomware Attacks: A 2025 Analysis

Publicly disclosed ransomware attacks on the retail sector globally surged by 58% in Q2 2025 compared to Q1, with UK-based firms being particularly targeted, according to a report by BlackFog. This spike in attacks follows high-profile breaches affecting retailers like Marks & Spencer (M&S), The Co-op, and Harrods, attributed to the threat actor known as Scattered Spider.

By Alan V Gutnov July 19, 2025 2 min read
Read full article

AI-Driven Lcryx Ransomware Emerges in Cryptomining Botnet

A cryptomining botnet active since 2019 has incorporated a likely AI-generated ransomware known as Lcryx into its operations. Recent analysis by the FortiCNAPP team at FortiGuard Labs identified the first documented incident linking H2miner and Lcryx ransomware. This investigation focused on a cluster of virtual private servers (VPS) utilized for mining Monero.

By Edward Zhou July 19, 2025 3 min read
Read full article

Preventing ClickFix Attacks: Safeguarding Against Human Error

ClickFix is an emerging social engineering technique utilized by threat actors to exploit human error. This technique involves misleading users into executing malicious commands under the guise of providing "quick fixes" for common computer issues. Threat actors use familiar platforms and deceptive prompts to encourage victims to paste and run harmful scripts.

By Alan V Gutnov July 19, 2025 3 min read
Read full article